Insert tool into device and rotate tool clockwise 90.
Rj45 plug lock.
1 x rj45 plug cable routing 180 shielded stp compliant with cat 6a requirements of iso iec 11801 edition 2 2 en 50173 1 2011 and en 60603 7 51 and ansi tia.
Rj45 patch cord locks black 12 locks ntw 7 lockable cat6 patented net lock rj45 ethernet network patch cable utp snagless black nl u6k 007bk lindy rj45 port lock 10 pieces with key color.
Panduit s tamper resistant rj45 lock in device attaches to any standard ethernet cable and prevents unauthorized removal from a jack.
Use a screwdriver or fi ngernail to release locking push plug out of the device.
The versatile design works with most existing patch cords faceplates patch panels ip cameras and other ip devices.
Align white line on tool with white line on device.
Recessed rj45 plug lock in device 10 devices international gray and 1 installation removal tool black polycarbonate international gray.
2m chengyu fu hongyue rj45 female to male cat6e network panel mount screw lock extension cable length.
Rj45 female to male simple cat6e network panel mount screw lock extension cable length.
Add an extra level of security to your expensive equipment without spending a large amount of money or installation time in the process.
Removing lock in device from rj45 plug step 1.
The rj45 plug lock in device is an innovative solution that secures connections to reduce network downtime data security breaches and hardware replacement.
Add to favorites.
The low profile design is compatible with any rj45 modular connector but will not interfere with adjacent jacks even in high density installations the included installation removal tool allows the cable to be locked or unlocked.
This rj45 plug by delock can be used to connect network cables.
Keep your sensitive cables in sensitive locations locked in their ports with the panduit rj45 plug lock in device.
Rotate tool counter clockwise 90 and remove tool from device.
Installing rj45 plug.
The rj45 plug lock in device is an innovative solution that secures connections to reduce network downtime data security breaches and hardware replacement due to theft.